Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    04-09-2023 01:21

General

  • Target

    1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b.exe

  • Size

    1.5MB

  • MD5

    4c6675bcb4996241e68fd4ac2fad45c2

  • SHA1

    e62124ae24bc980199900e5a7c392191882118cc

  • SHA256

    1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b

  • SHA512

    bf385448e4791a67e6fd79cc2310835320c7c590e95d2933eb661a5fd41712f8f6d3760410d733757effc08da32160b58909b14f8eb295b68594efa885542ab9

  • SSDEEP

    24576:C4Zv8wgIQYygkY9lA6pnLZGBrgxFdgLOjRFqD3Fd2U+1A4EKazGG7/52rhUVrp:CkYIhkeTYBrUyOjjU+1ArF/El+9

Score
10/10

Malware Config

Extracted

Family

limerat

Wallets

1B5aLZh6psoQttLGn9tpbdibiWqzyh4Jfv

Attributes
  • aes_key

    NYANCAT

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/LJe9sUk5

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    Temp

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    true

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/LJe9sUk5

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Signatures

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b.exe
    "C:\Users\Admin\AppData\Local\Temp\1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Users\Admin\AppData\Local\Temp\14982.exe
      "C:\Users\Admin\AppData\Local\Temp\14982.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2708
    • C:\Users\Admin\AppData\Local\Temp\1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b.exe
      C:\Users\Admin\AppData\Local\Temp\1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b.exe
      2⤵
        PID:1736
      • C:\Users\Admin\AppData\Local\Temp\1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b.exe
        C:\Users\Admin\AppData\Local\Temp\1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b.exe
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1676
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          3⤵
          • Modifies Installed Components in the registry
          • Modifies registry class
          PID:2412
          • C:\Windows\system32\ctfmon.exe
            ctfmon.exe
            4⤵
              PID:1248
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2816
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b' -Value '"C:\Users\Admin\AppData\Local\Temp\1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b.exe"' -PropertyType 'String'
            3⤵
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2760

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\14982.exe

        Filesize

        28KB

        MD5

        22df9b6c3a71b8dbbdef5d5bd09e445f

        SHA1

        0fdb02616c74e6eca4535d7b160a2e16a3e79943

        SHA256

        024cce95a63124cd3cbfe3f21fbacf8437fd288717fce379006064aa2a97641e

        SHA512

        2ada99e227f30c10453d588bbb6b40bdff55825a36bf5fcc16df084dbdca069e6cc0ac6aa612addd0393f8dc8751b3efc1c9626e2d78459faf9d348d1f46aaf3

      • C:\Users\Admin\AppData\Local\Temp\14982.exe

        Filesize

        28KB

        MD5

        22df9b6c3a71b8dbbdef5d5bd09e445f

        SHA1

        0fdb02616c74e6eca4535d7b160a2e16a3e79943

        SHA256

        024cce95a63124cd3cbfe3f21fbacf8437fd288717fce379006064aa2a97641e

        SHA512

        2ada99e227f30c10453d588bbb6b40bdff55825a36bf5fcc16df084dbdca069e6cc0ac6aa612addd0393f8dc8751b3efc1c9626e2d78459faf9d348d1f46aaf3

      • C:\Users\Admin\AppData\Local\Temp\14982.exe

        Filesize

        28KB

        MD5

        22df9b6c3a71b8dbbdef5d5bd09e445f

        SHA1

        0fdb02616c74e6eca4535d7b160a2e16a3e79943

        SHA256

        024cce95a63124cd3cbfe3f21fbacf8437fd288717fce379006064aa2a97641e

        SHA512

        2ada99e227f30c10453d588bbb6b40bdff55825a36bf5fcc16df084dbdca069e6cc0ac6aa612addd0393f8dc8751b3efc1c9626e2d78459faf9d348d1f46aaf3

      • C:\Users\Admin\AppData\Local\Temp\Cab9AEB.tmp

        Filesize

        61KB

        MD5

        f3441b8572aae8801c04f3060b550443

        SHA1

        4ef0a35436125d6821831ef36c28ffaf196cda15

        SHA256

        6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

        SHA512

        5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

      • C:\Users\Admin\AppData\Local\Temp\Tar9B6B.tmp

        Filesize

        163KB

        MD5

        9441737383d21192400eca82fda910ec

        SHA1

        725e0d606a4fc9ba44aa8ffde65bed15e65367e4

        SHA256

        bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

        SHA512

        7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

      • \Users\Admin\AppData\Local\Temp\14982.exe

        Filesize

        28KB

        MD5

        22df9b6c3a71b8dbbdef5d5bd09e445f

        SHA1

        0fdb02616c74e6eca4535d7b160a2e16a3e79943

        SHA256

        024cce95a63124cd3cbfe3f21fbacf8437fd288717fce379006064aa2a97641e

        SHA512

        2ada99e227f30c10453d588bbb6b40bdff55825a36bf5fcc16df084dbdca069e6cc0ac6aa612addd0393f8dc8751b3efc1c9626e2d78459faf9d348d1f46aaf3

      • \Users\Admin\AppData\Local\Temp\14982.exe

        Filesize

        28KB

        MD5

        22df9b6c3a71b8dbbdef5d5bd09e445f

        SHA1

        0fdb02616c74e6eca4535d7b160a2e16a3e79943

        SHA256

        024cce95a63124cd3cbfe3f21fbacf8437fd288717fce379006064aa2a97641e

        SHA512

        2ada99e227f30c10453d588bbb6b40bdff55825a36bf5fcc16df084dbdca069e6cc0ac6aa612addd0393f8dc8751b3efc1c9626e2d78459faf9d348d1f46aaf3

      • memory/1676-1359-0x0000000004AF0000-0x0000000004BB2000-memory.dmp

        Filesize

        776KB

      • memory/1676-1356-0x0000000000400000-0x00000000004AC000-memory.dmp

        Filesize

        688KB

      • memory/1676-1357-0x0000000074290000-0x000000007497E000-memory.dmp

        Filesize

        6.9MB

      • memory/1676-1358-0x0000000004CA0000-0x0000000004CE0000-memory.dmp

        Filesize

        256KB

      • memory/1676-2624-0x0000000074290000-0x000000007497E000-memory.dmp

        Filesize

        6.9MB

      • memory/1676-2659-0x0000000004CA0000-0x0000000004CE0000-memory.dmp

        Filesize

        256KB

      • memory/1676-3394-0x0000000074290000-0x000000007497E000-memory.dmp

        Filesize

        6.9MB

      • memory/2464-31-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-1330-0x0000000004800000-0x000000000484C000-memory.dmp

        Filesize

        304KB

      • memory/2464-27-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-0-0x0000000000A10000-0x0000000000B92000-memory.dmp

        Filesize

        1.5MB

      • memory/2464-29-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-39-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-37-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-35-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-33-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-41-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-43-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-47-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-45-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-51-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-49-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-53-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-55-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-57-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-59-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-61-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-63-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-65-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-67-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-796-0x0000000074290000-0x000000007497E000-memory.dmp

        Filesize

        6.9MB

      • memory/2464-895-0x00000000009D0000-0x0000000000A10000-memory.dmp

        Filesize

        256KB

      • memory/2464-1328-0x0000000000960000-0x0000000000961000-memory.dmp

        Filesize

        4KB

      • memory/2464-1329-0x0000000005270000-0x000000000533C000-memory.dmp

        Filesize

        816KB

      • memory/2464-23-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-25-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-17-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-21-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-19-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-15-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-1-0x0000000074290000-0x000000007497E000-memory.dmp

        Filesize

        6.9MB

      • memory/2464-2-0x00000000009D0000-0x0000000000A10000-memory.dmp

        Filesize

        256KB

      • memory/2464-1352-0x0000000074290000-0x000000007497E000-memory.dmp

        Filesize

        6.9MB

      • memory/2464-13-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-11-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-9-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-5-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-3-0x0000000004C30000-0x0000000004D98000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-4-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2464-7-0x0000000004C30000-0x0000000004D92000-memory.dmp

        Filesize

        1.4MB

      • memory/2708-2538-0x00000000041C0000-0x0000000004200000-memory.dmp

        Filesize

        256KB

      • memory/2708-2536-0x0000000074290000-0x000000007497E000-memory.dmp

        Filesize

        6.9MB

      • memory/2708-1342-0x00000000000A0000-0x00000000000AC000-memory.dmp

        Filesize

        48KB

      • memory/2708-1343-0x0000000074290000-0x000000007497E000-memory.dmp

        Filesize

        6.9MB

      • memory/2708-3505-0x00000000041C0000-0x0000000004200000-memory.dmp

        Filesize

        256KB

      • memory/2760-3500-0x000000006E920000-0x000000006EECB000-memory.dmp

        Filesize

        5.7MB

      • memory/2760-3503-0x000000006E920000-0x000000006EECB000-memory.dmp

        Filesize

        5.7MB

      • memory/2760-3507-0x0000000001CE0000-0x0000000001D20000-memory.dmp

        Filesize

        256KB

      • memory/2760-3524-0x000000006E920000-0x000000006EECB000-memory.dmp

        Filesize

        5.7MB

      • memory/2816-2674-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/2816-2675-0x0000000074290000-0x000000007497E000-memory.dmp

        Filesize

        6.9MB

      • memory/2816-3530-0x0000000074290000-0x000000007497E000-memory.dmp

        Filesize

        6.9MB